Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: KPN

Hostname: unknown

Organization: KPN B.V.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.129.3.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56875
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.129.3.21.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042001 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Apr 21 10:15:17 +08 2019
;; MSG SIZE  rcvd: 116

Host info
21.3.129.145.in-addr.arpa domain name pointer static.kpn.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
21.3.129.145.in-addr.arpa	name = static.kpn.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
106.12.110.157 attackbotsspam
Time:     Sun Aug 30 05:44:54 2020 +0200
IP:       106.12.110.157 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 19 09:10:12 mail-03 sshd[11681]: Invalid user qswang from 106.12.110.157 port 19034
Aug 19 09:10:14 mail-03 sshd[11681]: Failed password for invalid user qswang from 106.12.110.157 port 19034 ssh2
Aug 19 09:22:42 mail-03 sshd[12474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.110.157  user=root
Aug 19 09:22:44 mail-03 sshd[12474]: Failed password for root from 106.12.110.157 port 62769 ssh2
Aug 19 09:24:51 mail-03 sshd[12639]: Invalid user daisy from 106.12.110.157 port 25132
2020-08-30 12:52:50
121.254.133.205 attackbots
Invalid user oracle from 121.254.133.205 port 6664
2020-08-30 13:23:54
61.177.172.168 attack
Aug 30 07:03:50 ip106 sshd[11529]: Failed password for root from 61.177.172.168 port 62958 ssh2
Aug 30 07:03:54 ip106 sshd[11529]: Failed password for root from 61.177.172.168 port 62958 ssh2
...
2020-08-30 13:16:06
142.93.34.237 attackspam
Aug 30 07:54:05 lukav-desktop sshd\[20305\]: Invalid user sftp from 142.93.34.237
Aug 30 07:54:05 lukav-desktop sshd\[20305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.34.237
Aug 30 07:54:08 lukav-desktop sshd\[20305\]: Failed password for invalid user sftp from 142.93.34.237 port 39110 ssh2
Aug 30 07:58:01 lukav-desktop sshd\[20345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.34.237  user=root
Aug 30 07:58:03 lukav-desktop sshd\[20345\]: Failed password for root from 142.93.34.237 port 47702 ssh2
2020-08-30 13:11:32
222.186.30.112 attack
Aug 30 15:07:23 web1 sshd[681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
Aug 30 15:07:25 web1 sshd[681]: Failed password for root from 222.186.30.112 port 25189 ssh2
Aug 30 15:07:28 web1 sshd[681]: Failed password for root from 222.186.30.112 port 25189 ssh2
Aug 30 15:07:23 web1 sshd[681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
Aug 30 15:07:25 web1 sshd[681]: Failed password for root from 222.186.30.112 port 25189 ssh2
Aug 30 15:07:28 web1 sshd[681]: Failed password for root from 222.186.30.112 port 25189 ssh2
Aug 30 15:07:23 web1 sshd[681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
Aug 30 15:07:25 web1 sshd[681]: Failed password for root from 222.186.30.112 port 25189 ssh2
Aug 30 15:07:28 web1 sshd[681]: Failed password for root from 222.186.30.112 port 25189 ssh2
Aug 
...
2020-08-30 13:11:13
51.254.106.81 attackbotsspam
51.254.106.81 has been banned for [WebApp Attack]
...
2020-08-30 12:51:36
132.232.132.103 attackspam
Invalid user ali from 132.232.132.103 port 40476
2020-08-30 12:43:19
218.92.0.246 attackspam
Aug 30 07:17:25 MainVPS sshd[18772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.246  user=root
Aug 30 07:17:27 MainVPS sshd[18772]: Failed password for root from 218.92.0.246 port 38726 ssh2
Aug 30 07:17:42 MainVPS sshd[18772]: error: maximum authentication attempts exceeded for root from 218.92.0.246 port 38726 ssh2 [preauth]
Aug 30 07:17:25 MainVPS sshd[18772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.246  user=root
Aug 30 07:17:27 MainVPS sshd[18772]: Failed password for root from 218.92.0.246 port 38726 ssh2
Aug 30 07:17:42 MainVPS sshd[18772]: error: maximum authentication attempts exceeded for root from 218.92.0.246 port 38726 ssh2 [preauth]
Aug 30 07:17:47 MainVPS sshd[18917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.246  user=root
Aug 30 07:17:49 MainVPS sshd[18917]: Failed password for root from 218.92.0.246 port 1861 ssh2
...
2020-08-30 13:18:29
18.223.180.148 attack
mue-Direct access to plugin not allowed
2020-08-30 13:08:40
180.214.237.7 attack
Aug 30 03:53:55 *** sshd[15181]: Did not receive identification string from 180.214.237.7
2020-08-30 12:58:07
134.209.22.239 attackspam
Port Scan detected!
...
2020-08-30 13:07:36
50.3.89.98 attackbotsspam
Unauthorized access detected from black listed ip!
2020-08-30 12:55:00
222.186.173.238 attackbots
Aug 29 19:13:20 sachi sshd\[23638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
Aug 29 19:13:22 sachi sshd\[23638\]: Failed password for root from 222.186.173.238 port 52864 ssh2
Aug 29 19:13:25 sachi sshd\[23638\]: Failed password for root from 222.186.173.238 port 52864 ssh2
Aug 29 19:13:29 sachi sshd\[23638\]: Failed password for root from 222.186.173.238 port 52864 ssh2
Aug 29 19:13:41 sachi sshd\[23645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
2020-08-30 13:16:49
113.118.185.99 attack
Port scan on 1 port(s): 4899
2020-08-30 13:15:48
31.184.199.114 attack
Aug 30 05:52:46 [Censored Hostname] sshd[30593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.184.199.114 
Aug 30 05:52:47 [Censored Hostname] sshd[30593]: Failed password for invalid user 0 from 31.184.199.114 port 26654 ssh2[...]
2020-08-30 13:17:40

Recently Reported IPs

182.139.162.107 12.56.190.4 95.78.108.92 162.243.144.216
89.118.17.185 180.175.162.50 99.205.35.117 185.46.168.10
79.137.35.114 95.80.5.21 60.216.224.38 8.57.204.31
71.252.32.14 5.135.162.113 63.193.163.222 137.5.211.196
190.35.100.47 110.195.18.229 214.209.105.170 54.154.48.176